Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2021_31_4_a11, author = {Tch\'orzewski, Jacek and Jak\'obik, Agnieszka and Iacono, Mauro}, title = {An {ANN-based} scalable hashing algorithm for computational clouds with schedulers}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {697--712}, publisher = {mathdoc}, volume = {31}, number = {4}, year = {2021}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2021_31_4_a11/} }
TY - JOUR AU - Tchórzewski, Jacek AU - Jakóbik, Agnieszka AU - Iacono, Mauro TI - An ANN-based scalable hashing algorithm for computational clouds with schedulers JO - International Journal of Applied Mathematics and Computer Science PY - 2021 SP - 697 EP - 712 VL - 31 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2021_31_4_a11/ LA - en ID - IJAMCS_2021_31_4_a11 ER -
%0 Journal Article %A Tchórzewski, Jacek %A Jakóbik, Agnieszka %A Iacono, Mauro %T An ANN-based scalable hashing algorithm for computational clouds with schedulers %J International Journal of Applied Mathematics and Computer Science %D 2021 %P 697-712 %V 31 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2021_31_4_a11/ %G en %F IJAMCS_2021_31_4_a11
Tchórzewski, Jacek; Jakóbik, Agnieszka; Iacono, Mauro. An ANN-based scalable hashing algorithm for computational clouds with schedulers. International Journal of Applied Mathematics and Computer Science, Tome 31 (2021) no. 4, pp. 697-712. http://geodesic.mathdoc.fr/item/IJAMCS_2021_31_4_a11/
[1] [1] Abdoun, N., El Assad, S., Taha, M.A., Assaf, R., Deforges, O. and Khalil, M. (2016). Secure hash algorithm based on efficient chaotic neural network, 2016 International Conference on Communications (COMM), Bucharest, Romania, pp. 405–410.
[2] [2] Aggarwal, K. and Verma, H.K. (2015). Hash RC6—variable length hash algorithm using RC6, 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India, pp. 450–456.
[3] [3] Al-Hamdani, W.A. (2011). Elliptic curve for data protection, Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD’11, New York, USA, pp. 1–14.
[4] [4] Amazon (2019). Amazon EC2 instance types, Amazon Web Services, https://aws.amazon.com/ec2/instance-types/.
[5] [5] Atkinson, K.E. (1978). An Introduction to Numerical Analysis, 2nd Edn, Wiley, Hoboken.
[6] [6] Barbierato, E., Gribaudo, M., Iacono, M. and Jakóbik, A. (2019). Exploiting CloudSim in a multiformalism modeling approach for cloud based systems, Simulation Modelling Practice and Theory 93: 133–147.
[7] [7] Bellare, M. and Kohno, T. (2004). Hash function balance and its impact on birthday attacks, in C. Cachin and J.L. Camenisch (Eds), Advances in Cryptology, EUROCRYPT 2004, Springer, Berlin, pp. 401–418.
[8] [8] Bowen, P., Hash, J. and Wilson, M. (2006). Information Security Handbook: A Guide for Managers, NIST Special Publication 800-100, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf.
[9] [9] Butcher, J.C. (2008). Numerical Methods for Ordinary Differential Equations, 2nd Edn, Wiley, Hoboken.
[10] [10] Chugunkov, I.V., Ivanov, M.A. and Kliuchnikova, B.V. (2019). Hash functions are based on three-dimensional stochastic transformations, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg/Moscow, Russia, pp. 202–205.
[11] [11] Cococcioni, M. (2021). Mackey-Glass time series generator, MathWorks, https://www.mathworks.com/matlabcentral/fileexchange/24390-mackey-glass-time-series-generator.
[12] [12] CSA (2011). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance, Bellingham, https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf.
[13] [13] Du, Y., He, G. and Yu, D. (2016). Efficient hashing technique based on bloom filter for high-speed network, 8th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, Vol. 01, pp. 58–63.
[14] [14] Dworkin, M.J. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS PUB 202, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.
[15] [15] ENISA (2009). Cloud Computing: Benefits, Risks and Recommendations for Information Security, European Network and Information Security Agency, Athens, https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security.
[16] [16] Fernandez-Cerero, D., Jakóbik, A., Grzonka, D., Kołodziej, J. and Fernandez-Montes, A. (2018). Security supportive energy-aware scheduling and energy policies for cloud environments, Journal of Parallel and Distributed Computing 119: 191–202.
[17] [17] Fernandez-Cerero, D., Fernandez-Montes, A., Jakóbik, A., Kołodziej, J. and Toro, M. (2018). SCORE: Simulator for cloud optimization of resources and energy consumption, Simulation Modelling Practice and Theory 82: 160–173.
[18] [18] Gholipour, A., Araabi, B.N. and Lucas, C. (2006). Predicting chaotic time series using neural and neurofuzzy models: A comparative study, Neural Processing Letters 24(3): 217–239.
[19] [19] Gong, Z. (2016). Survey on lightweight hash functions, Journal of Cryptologic Research 3(1): 1–11.
[20] [20] Google (2016). Encryption at rest in Google Cloud, Google Cloud Documentation, https://cloud.google.com/security/encryption/default-encryption.
[21] [21] Grzonka, D. (2018). Intelligent Agent-based Monitoring Systems of Task Scheduling for Distributed High-Performance Environments, PhD thesis, Polish Academy of Sciences, Warsaw.
[22] [22] Grzonka, D., Jakóbik, A., Kołodziej, J. and Pllana, S. (2018). Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security, Future Generation Computer Systems 86: 1106–1117.
[23] [23] Haykin, S. (1998). Neural Networks: A Comprehensive Foundation, 2nd Edn, Prentice Hall, Upper Saddle River.
[24] [24] Huang, W. and Wang, L. (2019). A hash function based on sponge structure with chaotic map for spinal codes, 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), Beijing, China, pp. 1–5.
[25] [25] ISO/IEC (2005). Information Technology-Security Techniques-Code of Practice for Information Security Management, ISO/IEC 27002:2005, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://w ww.iso.org/standard/50297.html.
[26] [26] ISO/IEC (2015). Information Technology-Security Techniques-Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services, ISO/IEC 27017:2015, International Organization for Standardization/International Electrotechnical Commission, Geneva, https://www.iso.org/standard/43757.html.
[27] [27] Jakóbik, A. (2016). Big data security, in F. Pop et al. (Eds), Resource Management for Big Data Platforms: Algorithms, Modelling, and High-Performance Computing Techniques, Springer, Cham, pp. 241–261, DOI: 10.1007/978-3-319-44881-7 12.
[28] [28] Jakóbik, A., Grzonka, D. and Kołodziej, J. (2017a). Security supportive energy aware scheduling and scaling for cloud environments, European Conference on Modelling and Simulation, ECMS 2017, Budapest, Hungary, pp. 583–590.
[29] [29] Jakóbik, A., Grzonka, D. and Palmieri, F. (2017b). Non-deterministic security driven meta scheduler for distributed cloud organizations, Simulation Modelling Practice and Theory 76: 67–81.
[30] [30] Jakóbik, A., Grzonka, D., Kołodziej, J. and González-Vélez, H. (2016). Towards secure non-deterministic meta-scheduling for clouds, 30th European Conference on Modelling and Simulation, ECMS 2016, Regensburg, Germany, pp. 596–602, DOI: 10.7148/2016-0596.
[31] [31] Jakóbik, A. and Wilczynski, A. (2017). Using polymatrix extensive Stackelberg games in security-aware resource allocation and task scheduling in computational clouds, Journal of Telecommunications and Information Technology 1: 71–80.
[32] [32] Jankowski, N. and Linowiecki, R. (2019). A fast neural network learning algorithm with approximate singular value decomposition, International Journal of Applied Mathematics and Computer Science 29(3): 581–594, DOI: 10.2478/amcs-2019-0043.
[33] [33] Kaur, N., Saini, H.S. and Singh, R. (2009). Design and analysis of secure scheduler for MLS distributed database systems, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 1400–1404.
[34] [34] Kidon, M. and Dobai, R. (2017). Evolutionary design of hash functions for IP address hashing using genetic programming, IEEE Congress on Evolutionary Computation (CEC), Donostia, Spain, pp. 1720–1727.
[35] [35] Kołodziej, J. (2012). Evolutionary Hierarchical Multi-Criteria Metaheuristics for Scheduling in Large-Scale Grid Systems, Springer, Berlin.
[36] [36] Yee, L.P. and De Silva, L.C. (2002). Application of multilayer perceptron network as a one-way hash function, International Joint Conference on Neural Networks. IJCNN’02, Honolulu, USA, Vol. 2, pp. 1459–1462.
[37] [37] Mahjoob, M.J., Abdollahzade, M., Zarringhalam, R. and Kalhor, A. (2008). Chaotic time series forecasting using locally quadratic fuzzy neural models, 9th WSEAS International Conference on Fuzzy Systems, Sofia, Bulgaria, pp. 26–32.
[38] [38] Menezes, A.J., Vanstone, S.A. and Oorschot, P.C.V. (1996). Handbook of Applied Cryptography, CRC Press, Boca Raton.
[39] [39] Merkle, R.C. (1979). Secrecy, Authentication, and Public Key Systems, Stanford University, Stanford, pp. 11–16.
[40] [40] Mohan, S., Yoon, M.K., Pellizzoni, R. and Bobba, R. (2014). Real-time systems security through scheduler constraints, 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, pp. 129–140.
[41] [41] NIST (2015). Secure Hash Standard (SHS), FIPS PUB 180-4, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.
[42] [42] NIST (2019). Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process, NISTIR 8268, National Institute of Standards and Technology, Gaithersburg, https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8268.pdf.
[43] [43] Podolskiy, V., Jindal, A. and Gerndt, M. (2019). Multilayered autoscaling performance evaluation: Can virtual machines and containers co-scale?, International Journal of Applied Mathematics and Computer Science 29(2): 227–244, DOI: 10.2478/amcs-2019-0017.
[44] [44] Rajeshwaran, K. and Anil Kumar, K. (2019). Cellular automata based hashing algorithm (CABHA) for strong cryptographic hash function, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, pp. 1–6.
[45] [45] Saleh, M. and Dong, L. (2013). Real-time scheduling with security enhancement for packet switched networks, IEEE Transactions on Network and Service Management 10(3): 271–285.
[46] [46] Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New York.
[47] [47] Singh, M. and Garg, D. (2009). Choosing best hashing-strategies and hash functions, 2009 IEEE International Advance Computing Conference, Patiala, India, pp. 50–55.
[48] [48] Tadokoro, H., Kourai, K. and Chiba, S. (2010). A secure system-wide process scheduler across virtual machines, 2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing, Tokyo, Japan, pp. 27–36.
[49] [49] Tchórzewski, J. and Jakóbik, A. (2019). Theoretical and experimental analysis of cryptographic hash functions, Journal of Telecommunications and Information Technology 1: 125–133.
[50] [50] Tchórzewski, J., Jakóbik, A. and Grzonka, D. (2019). Towards ANN-based scalable hashing algorithm for secure task processing in computational clouds, 33rd International ECMS Conference on Modelling and Simulation, Caserta, Italy, pp. 421–427.
[51] [51] Turcanik, M. (2017a). Hash function generation based on neural networks and chaotic maps, Communication and Information Technologies (KIT), Vysoke Tatry, Slovakia, pp. 1–5.
[52] [52] Turcanik, M. (2017b). Using recurrent neural network for hash function generation, International Conference on Applied Electronics (AE), Pilsen, Chech Republic, pp. 1–4.
[53] [53] Wang, M. and Li, Y. (2015). Hash function with variable output length, International Conference on Network and Information Systems for Computers, Wuhan, China, pp. 190–193.
[54] [54] Yang, Q., Gao, T., Fan, L. and Gu, Q. (2009). Analysis of one-way alterable length hash function based on cell neural network, 5th International Conference on Information Assurance and Security, Xi’an, China, Vol. 1, pp. 391–395.